TECHNOLOGY > > Resilience


« Back to News

2021-11-29

5G Networks Lack Adequate Cloud Security

5G systems provide greatly accelerated speed & bandwidth, but they can be vulnerable targets for cyber attacks if they are not properly secured. 

2021-11-22

How Does IAM Help In GDPR Compliance?

Using Identity and Access Management (IAM) facilitates GDPR compliance and makes sure that most GDPR requirements are adhered to. By Naren Sahoo

2021-11-19

123456 Is Not A Password

The exploding use of online apps & services means users increasingly have to remember many more passwords - and passwords are the weak link.

2021-11-16

Practical Cyber Security Tips For Remote Working

Remote working increases the risks of a data breach - every employee must be responsible for protecting corporate information. By Charlie Svensson

2021-11-11

Microsoft Gets Serious About Dealing With The Skills Shortage

Microsoft plans to halve the United States' cyber security workforce shortage by 2025 by pouring big money and resources into training programs.

2021-11-09

The Value Of Network Pen Testing To Reduce Cyber Attacks

To make better decisions about cyber security you need to know your vulnerabilities - understanding your threat landscape is essential to stay safe.

2021-11-09

Focus On Fighting Cyber Crime In Financial Services

Effective cyber security techniques can protect networks, data, computers & software, but finding the right specialist professional support is hard.

2021-11-02

New US National Cyber Director

The US’s first National Cyber Director, Chris Inglis, wants to take a tougher, more proactive approach to those who threaten America’s networks.

2021-10-29

A Short Guide To Ransomware

Ransomware is malware designed to deny access to computer systems or sensitive data until a ransom is paid. Here are some examples.

2021-10-27

CISA, FBI & NSA Issue Ransomware Warning Alert

US federal agencies urge organisations to implement immediate actions outlined in the joint advisory to defend against Conti ransomware.

2021-10-26

Cyber Security - How Confident (Complacent?) Are You?

How often should organizations review their cyber security strategy? If it's not been done recently, the chances are you’re at risk. By Paul German

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cypress Semiconductor

Cypress Semiconductor

Cypress is a semiconductor design and manufacturing company providing embedded devices for secure IoT applications.

Sucuri

Sucuri

Sucuri have offered holistic website security solutions since 2008 including malware removal, malware monitoring and website protection services.

PlaxidityX

PlaxidityX

PlaxidityX (formerly Argus Cyber Security) is a global leader in mobility cyber security, provides DevSecOps, vehicle protection and fleet protection technologies and services.

SecureDevice

SecureDevice

SecureDevice is a Danish IT Security company.

NetMonastery DNIF

NetMonastery DNIF

NetMonastery is a network security company which assists enterprises in securing their network and applications by detecting threats in real time.

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

Partnership for Conflict, Crime and Security Research (PaCCS)

Partnership for Conflict, Crime and Security Research (PaCCS)

PaCCS delivers high quality and cutting edge research to improve our understanding of current and future global security challenges in areas including cybersecurity.

River Loop Security

River Loop Security

River Loop Security specialize in solving complex cybersecurity challenges in the IoT and embedded devices space.

LiveAction

LiveAction

LiveAction provides end-to-end visibility of network and application performance from a single pane of glass.

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

CMDC’s mission is to foster university-industry-government partnerships to assure that medical devices are safe and secure from cybersecurity threats.

D2 Network Associates (D2NA)

D2 Network Associates (D2NA)

D2NA help businesses deliver and achieve their goals, through innovative IT solutions, robust cyber security services and proactive IT managed services.

CYMAR

CYMAR

CYMAR The “CYBER” Smart Solution to offer sustainability and bring resilience to Global SMART Terminals and protect the supply chain of the World’s economy.

Cybastion

Cybastion

Cybastion develops robust world-class cybersecurity solutions tailored to suit the needs of different businesses, governments and public sector entities.

Netsurit

Netsurit

Managed IT, Cloud, and Security Services. Netsurit is Your IT Innovation and Digital Transformation Accelerator.

AuditBoard

AuditBoard

AuditBoard is the leading cloud-based platform transforming audit, risk, ESG, and InfoSec management.

Cynclair

Cynclair

Cybersecurity is a complex beast. And we're the beast-tamers. Our team thrives on deciphering the latest threats, building cutting-edge defenses, and making your digital world much safer.